HandlerPathspl
Static task
static1
Behavioral task
behavioral1
Sample
b6fb571a7711c1a301673d32aed5a177f8dbf68d0451a9211628e31f4a0972b7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6fb571a7711c1a301673d32aed5a177f8dbf68d0451a9211628e31f4a0972b7.dll
Resource
win10v2004-20220812-en
General
-
Target
b6fb571a7711c1a301673d32aed5a177f8dbf68d0451a9211628e31f4a0972b7
-
Size
160KB
-
MD5
54a5a58ae0333134189502985eaec5c0
-
SHA1
81d300bc988313b98225dc8f879fe670984ba4c9
-
SHA256
b6fb571a7711c1a301673d32aed5a177f8dbf68d0451a9211628e31f4a0972b7
-
SHA512
d6fbfde942b0ca75436a5862237fc4c146acc3d56e7346d39666884b7693b6cb6b4cae6ac3f15d08ae41d853bbb5f0c64d0a15ae3f77d60f22a62a43d0743415
-
SSDEEP
3072:rbetNNwZueVsw6CfjhPiAIKvNhexntna1rLqR/YbZh:rbeKjqyXGws/YD
Malware Config
Signatures
Files
-
b6fb571a7711c1a301673d32aed5a177f8dbf68d0451a9211628e31f4a0972b7.dll windows x86
22310e01147fd3673104aaa6984a9c72
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
GetComputerNameA
UnmapViewOfFile
EnterCriticalSection
WriteProcessMemory
ReadProcessMemory
GetProcAddress
SetLastError
GetVolumeInformationA
CreateFileMappingA
HeapFree
Sleep
GetModuleFileNameA
HeapAlloc
ExitProcess
InterlockedIncrement
CreateProcessA
CloseHandle
CopyFileA
InterlockedDecrement
GlobalFree
MapViewOfFile
LoadLibraryA
TerminateProcess
GetCommandLineA
GetModuleHandleA
CreateFileA
LocalFree
WaitForSingleObject
OpenEventA
GetTickCount
GetCurrentProcess
GlobalAlloc
GetLastError
CreateMutexW
WriteFile
OpenFileMappingA
GetProcessHeap
CreateEventA
CreateDirectoryA
LeaveCriticalSection
ole32
CoTaskMemAlloc
CoCreateGuid
OleSetContainedObject
CoUninitialize
CoSetProxyBlanket
OleCreate
CoInitialize
CoCreateInstance
user32
RegisterWindowMessageA
ClientToScreen
GetMessageA
GetSystemMetrics
GetClassNameA
GetParent
SetWindowLongA
SetTimer
SendMessageA
FindWindowA
PostQuitMessage
TranslateMessage
ScreenToClient
DefWindowProcA
KillTimer
GetCursorPos
SetWindowsHookExA
GetWindowThreadProcessId
DestroyWindow
CreateWindowExA
PeekMessageA
GetWindowLongA
GetWindow
DispatchMessageA
UnhookWindowsHookEx
oleaut32
SysFreeString
SysStringLen
SysAllocString
SysAllocStringLen
shlwapi
UrlUnescapeW
StrStrIW
advapi32
RegDeleteValueA
SetTokenInformation
DuplicateTokenEx
RegQueryValueExA
RegCreateKeyExA
OpenProcessToken
GetUserNameA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
shell32
SHGetFolderPathA
Exports
Exports
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zfj Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ